Active attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Sandy Harris |
||
Line 3: | Line 3: | ||
==Parent topics== | ==Parent topics== | ||
{{r|cryptanalysis}} | {{r|cryptanalysis}} | ||
{{r|active attack}} | |||
==Subtopics== | ==Subtopics== |
Revision as of 02:36, 14 June 2010
- See also changes related to Active attack, or pages that link to Active attack or to this page or whose text contains "Active attack".
Parent topics
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Active attack [r]: An attack on a communications system in which the attacker creates, alters, replaces, re-routes or blocks messages; this contrasts with a passive attack in which he only reads them. [e]
Subtopics
- Man-in-the-middle attack [r]: An attack on a communications system in which the attacker deceives the communicating parties so they both talk to him while believing they are talking to each other. [e]
- Rewrite attack [r]: An attack on a communication system in which the attacker replaces a legitimate message with his own. [e]
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]
- Cryptographic authentication [r]: Cryptographic techniques for authenticating both senders and messages; the most common are digital signatures and hashed message authentication codes. [e]